Energy Efficient Scheduler Design in Wireless Networks

Size: px
Start display at page:

Download "Energy Efficient Scheduler Design in Wireless Networks"

Transcription

1 Energy Efficient Scheduler Design in Wireless Networks Jeongjoon Lee 1, Catherine Rosenberg 1, and Edwin K. P. Chong 2 1 School of Electrical and Computer Engineering Purdue University, West Lafayette, IN jjlee@purdue.edu, cath@ecn.purdue.edu 2 Dept. of Electrical and Computer Engineering Colorado State University, Fort Collins, CO echong@engr.colostate.edu Abstract. Minimizing energy consumption is crucial for portable wireless communication systems because they operate on a limited battery supply. For example, the IEEE standard includes a mechanism called power-saving mode (PSM), which allows a network interface on a mobile station to enter a sleep state whenever possible to reduce its energy consumption. However, the scheme needs to be complemented by an efficient scheduling mechanism to maximize the energy savings. The purpose of this paper is to show how well-designed scheduling disciplines along with a power-saving mode can achieve significant improvement in saving energy consumption. We propose a generic wireless system composed of an access point and several portable stations that offer a PSM to its users. Our PSM is different from that of the IEEE in the sense that to save more energy our PSM is driven and controlled by the access point, while the process is much more under the control of the stations in IEEE We study how to design the downlink scheduler in the access point so as to minimize the total energy consumption of all the portable stations that are in PSM. We formulate two scheduling problems (in a static context and in a dynamic one) and propose several heuristic scheduling policies to solve them. Extensive simulations show the significant improvement on energy saving of our policies over more traditional scheduling schemes. 1. Introduction Wireless stations have become an integral part of our day-to-day lives. A key concern in the design and development of such wireless stations is energy consumption. Although advances in battery technology and low-power circuit design have been significant, dramatic improvements in battery technology to meet the energy needs for future mobile stations are not expected in the near future [1]. As a result, minimizing power consumption is a major factor driving the design of mobile stations and of the protocols therein. As the authors of [2] show, a large part of the power drain of a mobile station connected to a wireless LAN can be attributed to its wireless LAN card. While this paper is not specifically on IEEE , it is interesting to discuss this wireless LAN technology as it is the most important example of data-oriented wireless technology to date. In IEEE , a wireless network interface can be in either the awake or doze states. In the awake state, there are three different modes TX (transmit), RX (receive), and IDLE (idle) and each consumes different amounts of energy. In the doze state, there are two different modes SLEEP (sleep) and OFF (power off) and the wireless network interface consumes much less energy in this state than in the awake state. Many researchers have closely studied through measurements the source of power drainage in wireless LAN cards, and have observed that the power consumption in idle mode is significant and even comparable to the receive-mode power consumption ([2], [3], [4], [5]). It has been shown by Stemm et al. [2] that leaving a wireless LAN card in sleep mode whenever possible can dramatically reduce its power consumption. The IEEE standard [6] recently introduced a power-saving mode (PSM), which offers an opportunity for stations that need it to reduce their power consumption by going into sleep mode on a regular basis. In the PSM specified in IEEE , the Access Point (AP) sends a Traffic Indication Map (TIM) containing information about its downlink queues (one per PSM station) at the beginning of each Beacon Period (BP). The TIM is the way to inform the PSM stations that care to listen if the AP has packets to deliver to them. It is then left to the station to decide when to request the sending of its packets.

2 We propose a PSM for a generic wireless LAN, which is different in many respects from that of IEEE In particular, we give a more central role to the AP since we believe that this will be necessary for offering QoS to some users and for taking full advantage of a power-saving mode. The purpose of this paper is to show how being in PSM yields considerable energy savings for a station as compared to the Constantly Awake Mode (CAM), when an efficient scheduling mechanism is used at the AP to manage the access to the downlink. In IEEE , every station (STA) that is associated with the AP in the PSM is assigned an association identifier (AID) during the association process, and the AID maps to a single bit in the TIM that indicates if there is any packet queued in the AP for that station. However, the TIM does not indicate the order of transmissions, the number of packets queued or to be transmitted, or the time when the station should awake or go into sleep mode. In addition to the Single Bit TIMs (SBT) used in the PSM, Stine et al. [7] propose three alternative directory protocols, Multiple Bit TIMs (MBT), Single Address Lists (SAL), and Two Address Lists (TAL), that may be used by a central node (e.g., the AP) to coordinate the transmission of data and the dozing cycles of PSM STAs. For example, the MBT uses multiple bits of the TIM identifying the number of exchanges in which a node participates. At the cost of these additional bits, the nodes may doze in the time preceding their packets, assuming an implicit order. The operation of the SAL is similar to the MBT with the difference that the addresses of the receiving nodes are listed in order. The TAL consists of two addresses for each packet transmission indicating which pairs of nodes are to awaken for each transmission in an ad-hoc network. While they also mention some scheduling issues, they mainly focus on directory protocols and simply use the SPT (Shortest Processing Time) scheduler [8], and hence this work is different from ours. Krashinsky et al. [9] study, via simulation, the performance-energy tradeoff when the IEEE PSM is used and show that the Round Trip Time (RTT) of a TCP connection can increase substantially with the PSM. They also find that the power consumption used to listen for TIMs can dominate the total energy consumption if the network is accessed only sporadically, and hence they propose to adapt the sleep duration depending on the past activity of the station to allow the network interface to sleep for longer periods of time when there is no activity, thereby reducing the energy consumed to listen to beacons. This work is different from ours in spirit. They focus on reducing the power consumption due to listening to beacons when the STAs are very sporadically active, while we focus on minimizing the overall total power consumption for all the levels of activities of the STAs. In addition, they are trying to reduce the power consumption individually for each STA by varying its sleep period, while our approach tries to reduce the overall power consumption of all the STAs in PSM by using the proper scheduling scheme at the AP. This paper is organized as follows. The Generic Power Management Model (GPMM) and the other assumptions we make for our study are introduced in Section 2. The problem formulation and the main results for both static and dynamic assumptions are presented in Section 3. Our conclusion and references follow. 2. Generic Power Management Model and General Assumptions We propose a Generic Power Management Model (GPMM) that keeps some of the main features of the PSM of IEEE while differing in other aspects. The main difference is that in GPMM the PSM is under the control of the AP rather than of the individual STAs. The GPMM is defined on the following wireless system comprising an Access Point (AP) and several stations (STA). To simplify, we assume that the downlink and the uplink are separated and that the AP is in full control of the downlink. Each STA can either be in the normal mode or in PSM (Power Saving Mode). When the STAs are in normal mode, they stay awake all the time (i.e., they never go into SLEEP mode). In the following, we assume that all the STAs are PSM-enabled. Note that, while we describe GPMM in the WLAN context, it could also be used in a satellite context. We assume that there is a message exchange between the AP and a STA that wants to go into PSM mode (we assume in our scenario that this is done when a station associates with the AP). Once this message exchange is completed, the AP allocates some buffer space to the new PSM STA and starts buffering the incoming packets for this new PSM STA. The AP proceeds as follows. Before the beginning of a new Beacon Period (BP) composed of (L+1) timeslots, the AP decides which packets to send in the coming BP using its own scheduling policy. The AP then prepares a TIM and sends a beacon with the TIM in the first timeslot of the BP. We assume that the TIM takes exactly one timeslot. The TIM is a bitmap consisting of one bit for each PSM STA indicating if there is at least one packet scheduled during the upcoming BP. That is, if there is at least one packet ready to be delivered by the AP to a PSM STA during the BP, then the corresponding bitmap is 1. Otherwise, it is 0. This is different from the TIM mechanism in IEEE , where the AP sets the TIM to 1 if there is at least one packet currently queued for the STA, regardless of whether or not the packet(s) destined to this STA will be scheduled during the corresponding BP.

3 We assume that the PSM STAs have to wake up at the beginning of each BP to listen to the TIM. If the bitmap for the STA is not set in the TIM, then the STA goes back immediately to sleep. Otherwise, the STA has to remain awake until the last packet scheduled for it in this BP is delivered. The STA knows if a packet it has received is the last one in the BP by inspecting the MORE DATA bit field in the packet header. If the MORE DATA bit is set to zero, it indicates that the packet is the last one to be scheduled in this BP, and hence after receiving the packet from the AP, the corresponding STA goes back into the SLEEP mode and stays in this mode until the beginning of the next BP. We assume that the STAs are always synchronized in time with the AP. Without loss of generality, we assume that the power consumption in IDLE mode, P IDLE, is equal to the power consumption in RX mode, P RX, and we assume that the power consumption in SLEEP mode is negligible. We also neglect the transition delays and the energy consumption when a STA changes its states. We assume that the packets are of fixed size and that a timeslot is designed to serve exactly one packet. The service is assumed to be gated, i.e., packets arriving in a BP are served only in or after the next BP (this is a reasonable assumption since the AP has to prepare the TIM in advance). We describe the differences between our model and the IEEE as follows. In IEEE , a STA is responsible for informing the AP, in its association request, of how often the STA will be awake (i.e., of the number of BPs henceforth called the ListenInterval between two consecutive waking-ups). If a ListenInterval of n BPs has been agreed upon by the AP and the STA, the station has to awake every n BPs to check if the AP has any data to send to it by listening to the TIM. By having a large ListenInterval, the station can stay longer in the SLEEP mode and, hence, save more energy while trading off QoS parameters such as delay. In the IEEE standard, a PSM STA when it awakes reads the TIM and requests the delivery of its buffered packets by sending a PS-POLL packet to the AP. The AP will respond to each PS-POLL by sending one packet to the requesting STA. In this way the STA controls when it starts receiving packets. While the mechanism related to ListenInterval and PS-POLL in IEEE gives the stations flexibility to partially control when the buffered packets will be sent so as to save energy, note that sending a PS-POLL does not guarantee the AP s rapid response. The AP may be congested, in which case the STA has to remain awake (i.e., in the IDLE mode) until the packet is eventually delivered without knowing if the delivery will be made in the next BP or in a subsequent BP. Hence, the energy saved by having a larger ListenInterval may be offset by increased IDLEmode power consumption. 3. Main Results 3.1 Static Case We first consider, in this section, the static scenario in which the number of PSM STAs within the coverage area of the AP, M, is fixed, and we focus on how to schedule in the most energy-efficient way a number of packets that have arrived before the BP under consideration, which we call the first BP to simplify the notation. This scenario is static in that, for each test case, once packets are queued at the beginning of our first BP, we assume that there are no more packets coming, and the scheduler s task is to send only the packets that are currently in the queue in the most power efficient manner. This scenario will help us gain insights about how to schedule in an energy-efficient way, and these insights will be used later in a more dynamic context. A work-conserving discipline is defined as a policy that does not allow the server to be idle if there are packets in queue, and in this sense the discipline is throughput-optimal. On the other hand, if we think of the nature of the PSM stations, which consider that saving more energy by trading off QoS parameters such as delay is acceptable, non-work-conserving disciplines are also worth investigating. Indeed, by putting themselves in PSM, the stations already agree to sacrifice QoS parameters such as delay and throughput, because while they are in SLEEP mode they cannot receive or send any packet, and this impacts the delay seen by their packets. Under our static assumption, we define what we call a semi-work-conserving discipline, which is a nonwork-conserving discipline defined as follows: Assume that N packets have to be scheduled at the beginning of the BP under consideration and that no more packets will arrive later. Due to the fixed number of timeslots in a BP (the first timeslot being reserved for the TIM and the next L timeslots being reserved for data transmissions), the number of BPs required to schedule all the N packets is Q = N / L. Under a work-conserving discipline, a schedule is determined regardless of Q, and there is no timeslot wasted until the last packet is scheduled (i.e., if there is a need to waste timeslots because N/L is not an integer, then the wasted timeslots are all at the end of the last BP (i.e., the Q th BP).) In contrast, under our semi-work-conserving discipline, the packets do not have to be scheduled consecutively, and the only restriction is that the packets currently queued should be scheduled within Q BPs, i.e., the number of BPs used to send the N packets is the same for both the work-conserving and the semi-work-conserving disciplines.

4 Problem Formulation for the Static Case and Preliminary Results. We formulate the problem to find an optimal semi-work-conserving scheduling discipline in the static case as follows: find the semi-work-conserving scheduling discipline U * that minimizes the overall power consumption of the PSM STAs, E: Q M Q M q q E = P M + E RX j = P M Q+ E (1) RX j q= 1 j= 1 q= 1 j= 1 q where E denotes the power consumption of the j th STA during the q th BP. Note that the first term in the j objective function in (1) is the energy spent by all the STAs to listen to the TIMs, and it is constant. Hence, our objective is equivalent to minimizing the second term, which is the energy consumption determined by scheduling. If there is no packet scheduled for the j th STA during the q th q BP, E is 0. Otherwise, it is the product j of P RX and the time duration (i.e., the number of timeslots) the j th station has to remain awake during the q th BP (i.e., from right after receiving the TIM to the time until the transmission of its last packet in this BP). We call the group of packets that are queued and destined for one STA a batch. The length of the j th batch, b j, is defined as the number of packets in queue at the beginning of the first BP for STA j. Suppose that all the packets queued at the beginning of the first BP can be scheduled within one BP (i.e., N<L). In this case, the SPT (Shortest Processing Time) algorithm [8] is proven to be optimal. The basic idea of the SPT algorithm is as follows: group the packets that belong to a STA together as a batch first, sort the batches in the order of nondecreasing length, and then schedule the batches according to that order. If the number of packets queued at the beginning of a BP is larger than L, then we need more than one BP to schedule all the packets. The minimum number of BPs needed to schedule all the packets currently queued is determined by Q= N/ L, and we have to schedule all the packets within Q BPs according to our semi-workconserving assumption. Note that for each BP, the number of packets to be scheduled can at most be L. We refer to this as the timeslot restriction. We also define the length of a schedule as the largest sum of length of batches scheduled in a BP. By definition, this length is at most L under the timeslot restriction. To derive some useful properties, we assume for the time being that while we use Q= N/ L number of BPs to schedule N packets, there is no timeslot restriction, i.e., the length of a schedule is not assumed to be restricted to be less than or equal to L. We will return to the general case with the timeslot restriction later. When there is no timeslot restriction, we introduce what we call the ESPT (Extended SPT) algorithm, which was first introduced as a variation of the SPT algorithm and proven to be optimal in [10] for the job-scheduling problem to minimize the mean flow time when jobs are assigned to multiple identical machines, where the flow time is defined as the duration from the time that a job is ready to the time that the processing of the last operation of the job is completed. Since our problem without timeslot restriction can be exactly transformed into this job-scheduling problem, we can prove that the ESPT algorithm is also optimal for our problem without timeslot restriction. We describe the ESPT algorithm as follows. 1. Sort the batches so that they are in non-decreasing order of lengths (i.e., b [1] b [2] b [M] ). Note that we will use square brackets [.] to denote the position in the order, i.e., the symbol [1] in the expression b [1] means the batch in first position in the order. Since we sort the batches in non-decreasing order, we have b [k] b [l] if k<l. 2. Partition the set of batches ordered as above to obtain the sets R r where R = { b, b, b,..., b [ ( 1) ] [ ( 1) 1] [ ( 1) 2] [ ( 1) ( 1)] } and r {1, 2,..., M / Q } r M r Q M r Q M r Q M r Q Q. (2) We define this set as the set of batches of rank r, i.e., the set of rank 1 consists of the Q largest batches, the set of rank 2 consists of the Q largest batches among the remaining batches, and so on. 3. An ESPT schedule may now be obtained by assigning each of the batches of rank 1 to be the last of a different Q BP. Next, each of the batches of rank 2 is assigned to a different BP, and so on. This construction can be interpreted as a Q-batches-at-a-time assignment procedure. Let us give an example. Suppose we have 9 PSM STAs that have b j =j, j=1, 2,, 9, and L=15. Then the total number of packets, N, is 45, and we have Q = 45 /15 = 3. Hence, we have 3 sets of different ranks: R 1 ={b 9, b 8, b 7 }, R 2 ={b 6, b 5, b 4 }, and R 3 ={b 3, b 2, b 1 }, and in this case a power-consumption-optimal schedule using the ESPT algorithm can be obtained as shown in Figure 1(a). Note that there are 3! ways of assigning 3 batches of each rank to 3 BPs, and hence there are (3!) 3 different ESPT schedules that achieve the optimal power consumption (e.g., Figure 1(b) shows another optimal schedule that could have been found by the ESPT algorithm.). Likewise, if there are M STAs, and Q BPs are required to schedule all the packets, then the total / number of optimal schedules obtained by the ESPT algorithm is (!) M Q Q ( M M / Q * Q)!. The only

5 BP1 b 1 b 4 b 7 BP1 b 1 b 5 b 9 BP2 b 2 b 5 b 8 BP2 b 2 b 6 b 7 BP3 b 3 b 6 b 9 BP3 b 3 b 4 b 8 (a) A power-consumption-optimal ESPT schedule (b) Another power-consumption-optimal ESPT schedule that meets timeslot restriction Figure 1. Examples of power-consumption-optimal ESPT schedules (In the figure, each row shows the order of the batch schedule from left to right for each BP; we do not care of the order of the BPs) restriction is that to achieve the optimal solution, two batches that belong to the same rank cannot be assigned to the same BP. We call this the rank restriction rule. NP-Completeness of our Problem in the General Case. Consider now the problem with timeslot restriction, which means that the length of a schedule S, L S, must satisfy L S L. As we have demonstrated in the last example, while the ESPT algorithm is very simple and efficient in finding power-consumption-optimal schedules when there is no timeslot restriction, the optimal schedules obtained have widely different schedule lengths. For example, the schedule shown in Figure 1(a) has a length of 18, which does not meet the timeslot restriction, while the schedule shown in Figure 1(b) has a length of 15. Hence, the first step we could do is to / find out if there exists a solution among those (!) M Q Q ( M M / Q * Q)! power-consumption-optimal schedules that satisfies L S L. Unfortunately it is not easy to determine if an optimal solution to our problem is among those schedules or not. We prove by the following theorem that this problem is NP-complete. Theorem 1. The problem to find a power-consumption-optimal schedule that satisfies L S L among the ESPT schedules without timeslot restriction is NP-hard. Proof: An NP-hard set-partitioning problem can be reduced to this problem (see [11] for more details). Energy Efficient Semi-Work-Conserving (EES) Scheduler. Since our general problem turns out to be NPhard, we propose a heuristic algorithm to solve it. We call our heuristic algorithm the EES (Energy Efficient Semi-work-conserving). It consists of two parts: first, in a heuristic way we try to find a schedule that satisfies / L S L among those (!) M Q Q ( M M / Q * Q)! power-consumption-optimal schedules without timeslot restriction. Second, if the heuristic is not able to find such a schedule, it performs batch splitting (i.e., a batch is sent over more than one BP). Note that batch splitting cannot improve the overall power consumption; hence, we perform batch splitting in a way that tries not to increase the total power consumption. The basic idea is as follows. To find a schedule that satisfies L S L among the power-consumption-optimal schedules without timeslot restriction, we try to normalize the schedule length of each BP. To do this, for each batch we first compute the difference from the smallest batch among the batches of the same rank, i.e., the length difference d j for the batch b j that is in rank r, is computed as d j = b j -min k {b k ; b k œr r }. Then we partition the d j s into Q BPs such that max{ê jœbp1 d j, Ê jœbp2 d j,, Ê jœbpq d j } is minimized. In partitioning the d j s, we sort them in non-increasing order and assign the largest one in order to the BP with the smallest sum of length differences. In addition, it is necessary to retain the original rank restriction so that each BP is assigned exactly one batch from each rank. The details of the EES algorithm are given below. EES (Energy Efficient Semi-Work-Conserving) algorithm Step 1: Group all the packets for a given station j in a batch b j. If the total number of packets currently queued is less than or equal to L, then schedule the batches in non-decreasing order (SPT); done. Else, go to Step 2. Step 2: Create the sets R r s as in (2). Step 3: For each batch b j œr r, "r, calculate the length difference d j as d j = b j -min k {b k ; b k œr r }. Step 4: Assign batches to the Q BPs according to the following rules. (i) Assign the batch with the largest length difference to the BP with the smallest sum of the length differences as long as the next rule is not violated. (ii) The batch b j œr r can only be assigned to BP l, if l has no other batch from R r already assigned to it. (iii) If there is more than one BP that has the smallest sum of the length differences and that meets the rule (ii), then assign the batch to the BP with the smallest sum of lengths of batches, to break the tie. Step 5: Once every batch is assigned, check if each BP has the sum of the lengths of its batches equal to at most L. If yes, go to Step 7. Else, go to Step 6. Step 6: Consider the BPs that have the sum of the lengths of their batches greater than L. (i) Sort the batches in the BP in non-increasing order of length.

6 (ii) Reassign the batches in that order to that BP until the sum of lengths of the assigned batches is equal to L. Split a batch if it is needed. Add unassigned (possibly split) batches to a temporary set of batches W. Do this for all the BPs that have the sum of lengths of batches greater than L. (iii) If W=«, then go to step 7. Otherwise, for the batches currently in W do the following. a. Take the batch with the largest length in W. b. Assign this batch, say b d, to the BP, say B i that has the smallest number of batches among the BPs that have the sum of lengths of batches less than L. If there is more than one BP with the same smallest number of batches, then try the one with the smallest sum of lengths of batches first, to break tie. If, by assigning b d to B i, the sum of lengths of batches for B i, say Z(B i ) becomes greater than L, then split the batch b d into batches b d(c) and b d(~c). The split batches b d(c) and b d(~c) have their lengths b d -(Z(B i )-L) and Z(B i )-L correspondingly, and b d(c) is assigned to B i. Add the remaining batch b d(~c) to W. Go to iii). Step 7: For each BP, schedule the batches in the SPT order; done. We illustrate our heuristic by applying it to the same example we have shown in Figure 1. After partitioning the batches into the sets of ranks, we compute the length difference d j for each batch in each rank. For example, for the batches of rank 1, we compute the length differences d 9 =b 9 -b 7 =2, d 8 =b 8 -b 7 =1, and d 7 =b 7 -b 7 =0. Then, we sort the batches in the order of non-increasing length differences and start to assign each of them in order to the one of 3 BPs with the smallest sum of length differences. For example, we first assign b 9, b 6, and b 3 to each BP since the corresponding differences are equal to 2. The sum of the length differences for each BP is then updated to 2. Then b 8, b 5, and b 2, each of which has a length difference of 1, are assigned to the 3 BPs. When we assign b 8, we cannot assign it to BP1 since b 9, which is of the same rank as b 8, is already assigned to it. Thus, b 8 could only be assigned to BP2 or BP3. Since both have the sum of the length differences of 2, there is a tie. To break the tie between BP2 and BP3, we choose the BP with the smaller sum of the lengths of batches; hence, BP3 is chosen since it has the sum of the length of its batches as 3 while BP2 has 6. Next, to assign b 5, we choose BP1 since BP1 has the smallest sum of the length differences among the BPs that meet the rankrestriction rule. We continue to assign the batches in this way, and after assigning all the batches, we schedule the batches in each BP in non-decreasing order. This schedule corresponds to the one shown in Figure 1(b). Note that the length of this power-consumption-optimal schedule is 15, and this meets timeslot restriction. (If it had not, we start batch splitting as detailed in the algorithm) Simulation Results. We illustrate the performance of our EES algorithm by simulation. Since we assume the static case scenario, for each test case, the number of STAs (M) is fixed, the number of packets currently queued (N) is selected at the beginning of the first BP, and then the scheduling is done only for those N packets that are currently in the queue assuming that no more packets will come. To generate a large number of test cases, we generate the batches for the stations as follows. For each STA, we generate a batch of size b (0 b L+1) with probability p b : L + 1 b L+ 1 b p = ( ) p (1 p) (3) b b where p is called the generation probability. Hence the average batch per STA is of length p(l+1). We assume that all the STAs are independent and identically distributed (i.i.d.), and therefore X=pM(L+1) packets on average are waiting to be scheduled at the beginning of the first BP. For each test case, once the packets are generated, as described above, at the beginning of the first BP, the number of BPs required to send all the packets currently queued is calculated as Q= N/ L, where N is the number of packets effectively generated, and the scheduler starts its schedule. Once the scheduler has scheduled all the packets in Q BPs, the total energy consumption is calculated, and the test case is done. We calculate the energy consumption for each test case by summing up the energy consumption of all the STAs. In calculating the energy consumption, we assume that every STA consumes exactly one unit of energy to receive a packet or to stay awake idle in a timeslot. For every BP, the energy consumption spent by all the STAs to listen to the TIM is added up to the total energy consumption. We vary p, the generation probability, from 0 to 1, and for each value of p, we generate 10,000 test cases. For each test case, we generate a (possibly different) number of packets, create the schedule with EES, and compute the total energy consumption. We repeat this process for 20 different random seeds. Then for a given value of p, we get the total energy consumption for 200,000 test cases and take their average. Figure 2(a) shows the total average energy consumption as a function of p for EES as well as for other scheduling disciplines (Round Robin (RR) and SPT), for M=10 and L=20. Figure 2(b) shows results for M=50 and L=50. We have run

7 total energy consumption 4.5 x RoundRobin SPT LowerBound(ESPT) EES total energy consumption x RoundRobin SPT LowerBound EES generation probability generation probability (a) When M=10 and L=20 (b) When M=50 and L=50 Figure 2. STATIC CASE: Total energy consumption comparison extensive simulations for different M s and L s, and have seen the same trend as exhibited in these two figures. It is clear on these figures that EES outperforms both RR and SPT, especially for large p. Another important aspect is how close the performance of our algorithm is to the optimal schedule, since our algorithm is a heuristic and therefore is not necessarily optimal. Since finding the optimal value is computationally burdensome, we instead compare the performance of our algorithm with that of the ESPT algorithm, which is free from the timeslot restriction. Note that the performance of the ESPT algorithm without timeslot restriction is a lower bound that can be achieved by the EES algorithm for some test cases. The performance of ESPT is also given in Figure 2. Note that the performance of the optimal solution to our problem is in between the performance of our EES algorithm and that of the ESPT algorithm, and hence by measuring the performance difference between our algorithm and ESPT, we get a sense of how close the performance of our EES algorithm is to that of the optimal solution. Hence, the results shown in Figure 2 confirm that our EES scheduler performs extremely well. 3.2 Dynamic Case We formulate our scheduling problem for the dynamic case in this section. We assume that packets arrive continually over time, and the AP decides a schedule at the beginning of every BP based on the packets that are in the buffers. Our problem formulation is as follows: find an optimal scheduling discipline U * that minimizes the average total power consumption of all the PSM STAs per BP, i.e., P M 1 q minimize E = lim E j P P (4) q= 1 j= 1 In the q th BP, a station j would spend at least one energy unit to receive the TIM and of at most L+1 energy units if the AP has scheduled one of its packets to be sent in the last timeslot of the BP (i.e., j, q, 1 E q L + 1). Hence the total energy (in units of energy) spent in a BP by a STA does not only j depend upon the number of packets that have been scheduled by the AP for that station but also upon the position of the last packet scheduled for that station in the BP. Based on what we have learned in the static case, we develop two heuristic scheduling disciplines and compare their performances with more traditional scheduling disciplines. The first of the two heuristic policies is a work-conserving scheduling discipline called LPTSPT (Longest Processing Time in selecting stations, Shortest Processing Time in scheduling packets). We show that without increasing the complexity of the algorithm compared to SPT (Shortest Processing Time), which is known to perform fairly well [7], LPTSPT performs better than or at least equal to SPT. The second is a non-work-conserving scheduling discipline called DEES (Dynamic Energy Efficient Semi-work-conserving), an extension to the dynamic case of the EES algorithm that we developed for the static case. We describe these policies in the next subsections and then evaluate their performances by simulation. LPTSPT. From the static case in which we showed that in some special cases, the SPT algorithm was optimal, we have learned two important rules to schedule in a way to minimize energy consumption: 1) Allocating adjacent timeslots to the packets that belong to a STA (i.e., treating them as a batch). 2) Scheduling the batches within a BP in the order of non-decreasing length. What LPTSPT does further as compared to SPT is to reduce the number of STAs to be scheduled during a BP so as to minimize the IDLE mode energy consumption.

8 The basic idea is as follows. Assume that the number of packets queued at the beginning of a BP, say N, is larger than the number of timeslots to schedule during a BP, say L (i.e., N>L). Then, the scheduler needs to select L out of N packets to schedule during this BP. Note that any work conserving scheduler must schedule L packets. In this case, we have two decisions to take: 1) How to select L packets (in particular from which stations)? 2) After having selected L packets, how to schedule them? For the second decision, we already have an answer: schedule the batches in the order of non-decreasing length. Let us first discuss what SPT does. SPT would order the batches in non-decreasing order (i.e., b 1 b 2 b M ) and would index them such that STA 1 is the one with the smallest batch. SPT would then choose STAs 1 to j where j is chosen such j 1 j that: i= 1b < L i i= 1b, would if necessary truncate b i j and allocate timeslots starting with the station having the shortest batch (could be station j because its batch has been truncated). For the first decision, LPTSPT does the following. While any work-conserving scheduler has to schedule exactly L packets (since N>L), to save more power it is key to reduce the number of STAs spending IDLE-mode energy. To this end, LPTSPT selects batches in the order of non-increasing length; i.e., it will select (assuming M M the same ordering as above) stations M to j where j is chosen such that: i= j+ 1b < L i i= jb. Then if necessary i LPTSPT would truncate batch b j and would then allocate timeslots in the same way as SPT. When N L, LPTSPT does the same as SPT, since all the packets currently queued are to be scheduled. Both algorithms schedule the batches in the same order of non-decreasing length in this case. We present below the details of our LPTSPT algorithm. LPTSPT (Longest Processing Time in selecting stations, Shortest Processing Time in scheduling packets) algorithm Step 1: Group all the packets for a given station j in a batch b j. Step 2: If the total number of packets currently queued is less than or equal to L, then schedule the batches in the order of non-decreasing length; done. Else, go to Step 3. Step 3: Sort the batches in the order of non-increasing length. Take as many batches as necessary to get L packets or more. If necessary, truncate the smallest selected batch. For the selected batches, schedule the batches in the order of non-decreasing length; done. Note that the LPTSPT algorithm involves at most one more sorting than the SPT algorithm, and hence the overall complexity remains O(MlogM), which is the same as the SPT algorithm. DEES. In the previous section, we have developed a heuristic non-work-conserving scheduling algorithm called EES for the static case. EES determines a schedule over Q BPs, the number of BPs required to send the N packets without putting any restriction on where the empty timeslot can be. By generalizing EES to the dynamic case, we allow our scheduler to not necessarily fill up the current BP even if N>L. This makes DEES a nonwork-conserving scheduler, and this will impact the delay performance. However, by nature the PSM stations consider that saving energy is of prime importance and hence are prepared to trade off QoS parameters such as delay for energy savings. Hence, non-work-conserving schedulers are also worth considering. We now present the DEES algorithm. Before the beginning of a BP, DEES decides the schedule for all the packets currently queued as if it needed to schedule all of them during Q= N/ L BPs starting from the current BP (in fact it will redo the same thing before each BP). Hence, out of this schedule, only what has been decided for the first BP will be used. Note that Steps from 1 to 6 of the DEES algorithm are the same as in the EES algorithm, and the only difference is Step 7. DEES (Dynamic Energy Efficient Semi-work-conserving) algorithm Step 1 ~ Step 6: Same as in the EES algorithm. Step 7: Among the Q BPs that have been scheduled, choose the BP with the longest length. Schedule the batches in that BP in the SPT order; done. The reason we adopt the strategy described in step 7 is as follows. At the end of step 6, we have allocated packets to the Q BPs. Only one out of these BP schedules will be used since the scheduler will start the process anew at the beginning of the next BP. There are several ways to select that BP schedule. In general, if we select the BP schedule with the least number of packets, then we should achieve lower energy consumption. However, this strategy could severely aggravate the delay performance and cause buffer overflows, i.e., it threatens the whole system stability. In contrast, choosing the BP schedule with the largest number of packets limits the impact on delay and on the system stability. For example, if the number of packets currently queued is 2L<N 3L, then Q=3 and we have to choose one BP schedule among 3 BP schedules. Since we choose the one with the largest number of packets, the number of packets that will be served is at least 2L/3. Likewise, if (Q-

9 average total energy consumption 14 x FIFO RR SPT LPTSPT DEES average packet delay FIFO RR SPT LPTSPT DEES offered load (a) Total energy consumption offered load (b) Average packet delay Figure 3. DYNAMIC CASE: Total energy consumption and average packet delay versus offered load (when M=10, L=20) 1)L<N QL, by choosing the one with the largest number of packets, the scheduler serves at least (Q-1)L/Q packets in a BP. As the queue length increases, Q increases, and the number of packets to be scheduled in a BP (i.e., (Q-1)L/Q) increases as well. Hence if the system becomes backlogged, the scheduler becomes less and less non-work-conserving. Simulation Results. We show the performances of the LPTSPT and the DEES algorithms by simulation. We generate the traffic for each STA using a binomial process; i.e., a packet is generated in a timeslot for a given STA with probability p, and all the STAs are assumed to be i.i.d. We assume that the number of STAs (M) is fixed throughout a simulation run. We assume the system to be gated; however, the packets arrive continually over time. We simulate 20 different cases per value of p, each case being generated from different random seeds. Each case comprises 200,000 timeslots. We calculate the total energy consumption by summing up the energy consumption of all the STAs over the 200,000 timeslots for each case, and then averaging for the 20 cases. We use the total energy consumption and the average packet delay as performance measures. We compare the performances of our algorithms with those of three other scheduling disciplines: FIFO, RR, and SPT. Figure 3(a) and (b) show the performance comparison in terms of the total energy consumption and the average packet delay as a function of the offered load r=pm when M=10 and L=20. Let us focus on the performance of LPTSPT first. As we can see from Figure 3(a), LPTSPT and SPT outperform FIFO and RR significantly in total energy consumption. In addition, LPTSPT outperforms SPT especially when the offered load is high. Note that when the offered load is low (up to around 0.6), LPTSPT performs at least equal to or slightly better than SPT. The reason is that in most BPs, the number of packets queued is less than or equal to L, so that all the packets can be scheduled within a BP. Delay performances for all the work-conserving schedulers including the LPTSPT are the same as expected, and they are shown in Figure 3(b). From these results, we can conclude that if delay is the main issue, then LPTSPT is a better discipline than the other work-conserving schedulers introduced in this paper. As for the DEES algorithm, it significantly outperforms other disciplines studied in this paper in total energy consumption, while trading it off for some amount of delay. When the offered load is lower than 0.6, the performance of the DEES algorithm in both the total energy consumption and the average packet delay is very close to that of LPTSPT. Again, this is because all the packets queued at the beginning of a BP are scheduled during the BP in most cases, and in this case, DEES does exactly the same as LPTSPT. As the offered load increases, we can achieve significant energy savings by using DEES. We have run extensive simulations for different M s and L s, and have seen the same trend. At the same time, one may worry about the delay performance since it is exponentially increasing as offered load goes close to 1. However, when the offered load is around 0.6~0.8, which is a typical network operating point, DEES saves up to 40% of energy relative to LPTSPT, which is the best discipline among the workconserving disciplines used in our simulation, at the cost of increasing the average packet delay by one more BP. Recall that since energy saving is of prime importance for energy-deprived mobile stations, DEES may indeed be an attractive option.

10 4. Conclusions We have modeled a generic wireless system that offers a PSM to its users. We have formulated the problem of minimizing the total power consumption of all the portable stations that are in PSM as a downlink transmissionscheduling problem. We have proposed several heuristic algorithms under both static and dynamic assumptions and evaluated their performance by simulation. Our results confirm that the EES algorithm (in the static case) and the DEES algorithm (in the dynamic case) yield significant energy savings when compared to FIFO, Round Robin, and SPT. Acknowledgement This work was supported in part by the Indiana Twenty-First Century Fund through the Indiana Center for Wireless Communication and Networking and the NSF grant , and by the NSF through grants ECS , ANI , and ANI References 1. J. Flinn and M. Satyanarayanan, Energy-aware adaptation for mobile applications, in Symposium on Operating Systems Principles, December 1999, pp M. Stemm and R. H. Katz, "Measuring and reducing energy consumption of network interfaces in handheld devices," IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Science, Aug. 1997, pp R. Kravets and P. Krishnan, Power management techniques for mobile communication, Proc. of Mobicom 98, Dallas, TX, October, 1998, pp L. M. Feeney and M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, Proc. Of IEEE Infocom 2001, Vol. 3, pp J.-P. Ebert, B. Burns, and A. Wolisz, A trace-based approach for determining the energy consumption of a WLAN network interface, In proc. of European Wireless 2002, Florence, Italy, Feb. 2002, pp The editors of IEEE , Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, J. A. Stine and G. de Veciana, Energy efficiency of centrally controlled transmission of fixed size packets, Proc. of WCNC 2000, pp W. E. Smith, Various optimizers for single-state production, Nav. Res. Log. Quart. 3, No. 1, March R. Krashinsky and H. Balakrishnan, Minimizing energy for wireless web access with bounded slowdown, Proc. of Mobicom 02, Sep , 2002, Atlanta, GA, pp R. W. Conway, W. L. Maxwell, and L. W. Miller, Theory of Scheduling, Addison-Wesley, R. M. Karp, Reducibility among combinatorial problems, in R. E. Miller and J. W. Thatcher (eds), Complexity of computer computations, Plenum Press, New York, 1972, pp

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

OPSM - Opportunistic Power Save Mode for Infrastructure IEEE WLAN

OPSM - Opportunistic Power Save Mode for Infrastructure IEEE WLAN OPSM - Opportunistic Power Save Mode for Infrastructure IEEE 82.11 WLAN Pranav Agrawal, Anurag Kumar,JoyKuri, Manoj K. Panda, Vishnu Navda, Ramachandran Ramjee Centre for Electronics Design and Technology

More information

Minimizing Energy for Wireless Web Access with Bounded Slowdown

Minimizing Energy for Wireless Web Access with Bounded Slowdown Wireless Networks 11, 135 148, 2005 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Minimizing Energy for Wireless Web Access with Bounded Slowdown RONNY KRASHINSKY and HARI

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Power Management Strategies for Mobile Devices in Wireless Networks

Power Management Strategies for Mobile Devices in Wireless Networks Power Management Strategies for Mobile Devices in Wireless Networks Kyungseo Park Department of Computer Science & Engineering University of Texas at Arlington kpark@cse.uta.edu Abstract As wireless networks

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society

Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC)

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Analysis of Power Management for Energy and Delay Trade-off in a WLAN

Analysis of Power Management for Energy and Delay Trade-off in a WLAN Analysis of Power Management for Energy and Delay Trade-off in a WLAN Mahasweta Sarkar and Rene.L Cruz Department of Electrical and Computer Engineering University of California at San Diego La Jolla,

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

AN4696 Application note

AN4696 Application note Application note SPWF01Sx power management options Introduction The purpose of this application note is to describe the power management options available on the SPWF01Sx Wi-Fi module [1]. It introduces

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

CS551 Router Queue Management

CS551 Router Queue Management CS551 Router Queue Management Bill Cheng http://merlot.usc.edu/cs551-f12 1 Congestion Control vs. Resource Allocation Network s key role is to allocate its transmission resources to users or applications

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Energy Efficiency in IEEE standard WLAN through MWTPP

Energy Efficiency in IEEE standard WLAN through MWTPP IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. I (Jan. 2014), PP 42-46 Efficiency in IEEE 802.11 standard WLAN through MWTPP Anupam Das, Prof.

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

An Energy-efficient Point Coordination Function Using Bidirectional Transmissions of Fixed Duration for Infrastructure IEEE 802.

An Energy-efficient Point Coordination Function Using Bidirectional Transmissions of Fixed Duration for Infrastructure IEEE 802. An Energy-efficient Point Coordination Function Using idirectional Transmissions of Fixed Duration for Infrastructure IEEE 82. WLANs Raúl Palacios, Fabrizio Granelli University of Trento Trento, Italy

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Cross-Layer Interactions and Optimizations in Wireless Networks

Cross-Layer Interactions and Optimizations in Wireless Networks Cross-Layer Interactions and Optimizations in Wireless Networks Catherine Rosenberg Joint work with Vivek Mhatre (now at Intel, UK), Sunil Kulkarni (now at Google, USA), Jeongjoon Lee (now at LG, Korea),

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Ch 4 : CPU scheduling

Ch 4 : CPU scheduling Ch 4 : CPU scheduling It's the basis of multiprogramming operating systems. By switching the CPU among processes, the operating system can make the computer more productive In a single-processor system,

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

EFFICIENT ROAMING OVER HETEROGENEOUS WIRELESS NETWORKS

EFFICIENT ROAMING OVER HETEROGENEOUS WIRELESS NETWORKS EFFICIENT ROAMIN OVER HETEROENEOUS IRELESS NETORKS Hosame Abu-Amara 1, Jeongjoon Lee 2, Catherine Rosenberg 2, and Edwin K. P. Chong **3 1 Telecommunications Engineering Program, University of Texas at

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Wireless Multicast: Theory and Approaches

Wireless Multicast: Theory and Approaches University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2005 Wireless Multicast: Theory Approaches Prasanna Chaporkar University of Pennsylvania

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Wide area networks: packet switching and congestion

Wide area networks: packet switching and congestion Wide area networks: packet switching and congestion Packet switching ATM and Frame Relay Congestion Circuit and Packet Switching Circuit switching designed for voice Resources dedicated to a particular

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Application Characterization for Wireless Network Power Management

Application Characterization for Wireless Network Power Management Application Characterization for Wireless Network Power Management Andreas Weissel, Matthias Faerber and Frank Bellosa University of Erlangen, Department of Computer Science 4 {weissel,faerber,bellosa}@cs.fau.de

More information

Distributed Floor Control Protocols for Computer Collaborative Applications on Overlay Networks

Distributed Floor Control Protocols for Computer Collaborative Applications on Overlay Networks Distributed Floor Control Protocols for Computer Collaborative Applications on Overlay Networks Shankar M Banik, Sridhar Radhakrishnan, Tao Zheng School of Computer Science University of Oklahoma Chandra

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

Bi-Objective Optimization for Scheduling in Heterogeneous Computing Systems

Bi-Objective Optimization for Scheduling in Heterogeneous Computing Systems Bi-Objective Optimization for Scheduling in Heterogeneous Computing Systems Tony Maciejewski, Kyle Tarplee, Ryan Friese, and Howard Jay Siegel Department of Electrical and Computer Engineering Colorado

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

A Power-Aware and QoS-Aware Service Model on Wireless Networks

A Power-Aware and QoS-Aware Service Model on Wireless Networks A Power-Aware and QoS-Aware Service Model on Wireless Networks Hao Zhu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 1682 E-mail: {hazhu,

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

CS557: Queue Management

CS557: Queue Management CS557: Queue Management Christos Papadopoulos Remixed by Lorenzo De Carli 1 Congestion Control vs. Resource Allocation Network s key role is to allocate its transmission resources to users or applications

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Faculty Of Computer Sc. & Information Technology (FSKTM)

Faculty Of Computer Sc. & Information Technology (FSKTM) By: Naeem Khademi (GS20561) Supervisor: Prof. Dr. Mohamed Othman Date/Time: 10 November 2009 9:00 AM Duration : 30 min Faculty Of Computer Sc. & Information Technology (FSKTM) University Putra Malaysia

More information

Solution for Homework set 3

Solution for Homework set 3 TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities

More information

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering

EECS 3214: Computer Network Protocols and Applications. Final Examination. Department of Computer Science and Engineering Department of Computer Science and Engineering EECS 3214: Computer Network Protocols and Applications Final Examination Instructor: N. Vlajic Date: April 9, 2016 Instructions: Examination time: 180 min.

More information

Improving VoD System Efficiency with Multicast and Caching

Improving VoD System Efficiency with Multicast and Caching Improving VoD System Efficiency with Multicast and Caching Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 1. Introduction 2. Previous Works 3. UVoD

More information

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

International Journal Of Advanced Smart Sensor Network Systems ( IJASSN ), Vol 2, No.1, January 2012

International Journal Of Advanced Smart Sensor Network Systems ( IJASSN ), Vol 2, No.1, January 2012 ENERGY EFFICIENT MAXIMUM LIFETIME ROUTING FOR WIRELESS SENSOR NETWORK Sourabh Jain 1, Praveen Kaushik 1, Jyoti Singhai 2 1 Department of Computer Sciene and Engineering Maulana Azad National Institute

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

Congestion Control 3/16/09

Congestion Control 3/16/09 Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if

More information

Bluetooth Time Division Duplex - Exact Analysis as a Polling System

Bluetooth Time Division Duplex - Exact Analysis as a Polling System CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of

More information

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks 12th Annual Symposium of the IEEE/CVT, Nov. 3, 2005, Enschede, the Netherlands 1 Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks T. D. Lagkas, G. I. Papadimitriou,

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Weighted Fair Queuing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information